DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
38ac1955bb2b3fcb4c6c1d332870eda0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38ac1955bb2b3fcb4c6c1d332870eda0.dll
Resource
win10v2004-20231215-en
Target
38ac1955bb2b3fcb4c6c1d332870eda0
Size
86KB
MD5
38ac1955bb2b3fcb4c6c1d332870eda0
SHA1
bc448bb86384bad3d9be71d1ff8f77f03bca50cf
SHA256
9abf6ff15569e0a6813b41f2658392486b64eb180a949171a8c2d730a22b5401
SHA512
f44240350ceaa196329c0819bf304e56712de8427929051c629731064ea5ddd2e73ee4ff6595ab31a5890b3bc9835894f66bd2d69def4560efeb7964ca758a51
SSDEEP
1536:qBgMLeLw7BdneDTZyy0jDTDZk8goHXQAvd5EvakpsHFLC1bX8qjWpLRD:q29AeDTZyLjDZkMHgAvd5EvbKFuFX8qs
Checks for missing Authenticode signature.
resource |
---|
38ac1955bb2b3fcb4c6c1d332870eda0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE